Author of the publication

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations.

, , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of Gene Regulatory Networks Using Variational Bayesian Inference in the Presence of Missing Data., , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 20 (1): 399-409 (January 2023)Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations., , , , , and . CoRR, (2022)Two Efficient Twin ELM Methods With Prediction Interval., , , , and . IEEE Trans. Neural Networks Learn. Syst., 26 (9): 2058-2071 (2015)Adversarial Privacy Protection on Speech Enhancement., , and . CoRR, (2022)Black-box adversarial attacks through speech distortion for speech emotion recognition., , and . EURASIP J. Audio Speech Music. Process., 2022 (1): 20 (2022)A new online learning algorithm for structure-adjustable extreme learning machine., , and . Comput. Math. Appl., 60 (3): 377-389 (2010)Coarse-to-Fine Adaptive Illumination Hard-Adjustment for Vision Inspection System Under Uncertain Imaging Conditions., , , and . IEEE SENSORS, page 1-4. IEEE, (2019)Adversarial Examples Protect Your Privacy on Speech Enhancement System., , and . Comput. Syst. Sci. Eng., 46 (1): 1-12 (2023)Exposing Speech Transsplicing Forgery with Noise Level Inconsistency., , and . Secur. Commun. Networks, (2021)A greedy-based crow search algorithm for semiconductor final testing scheduling problem., , , , , and . Comput. Ind. Eng., (September 2023)